Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of information flow which has become known as termination-insensitive noninterference. Under this version of noninterference, information leaks are permitted if they are transmitted purely by the program's termination behaviour (i.e., whether it terminates or not). This imperfection is the price to pay for having a security condition which is relatively liberal (e.g. allowing while-loops whose termination may depend on the value of a secret) and easy to check. But what is the price exactly? We argue that, in the presence of output, the price is higher than the “one bit” often claimed...
Basic information theory is used to analyse the amount of confidential information which may be leak...
AbstractThis paper suggests the following approach for checking whether a program satisfies an infor...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denn...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Noninterference, a strong security property for a computation process, informally says that the proc...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
AbstractBuilding on simple information-theoretic concepts, we study two quantitative models of infor...
Basic information theory is used to analyse the amount of confidential information which may be leak...
AbstractThis paper suggests the following approach for checking whether a program satisfies an infor...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denn...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Noninterference, a strong security property for a computation process, informally says that the proc...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
AbstractBuilding on simple information-theoretic concepts, we study two quantitative models of infor...
Basic information theory is used to analyse the amount of confidential information which may be leak...
AbstractThis paper suggests the following approach for checking whether a program satisfies an infor...
AbstractTiming channels constitute one form of covert channels through which programs may be leaking...